Communication Technology

Featured

Explore Communication Technology

  • Journal Article

    Geographic Targeting, Message Content and Character Limitation Subgroup Report

    This Communications Security, Reliability and Interoperability Council (CSRIC) report analyses geo-targeting, message content, and character limitations of the Wireless Emergency Alerts (WEA).

    Feb 27, 2015

  • Group of young students studying in the classroom with a laptop

    Report

    Education, Technology and Connectedness: Global Societal Trends to 2030

    The spread of technology and its relationship to education will transform the education and power of citizens, forming a significant societal challenge for the European Union in the coming decades.

    Feb 12, 2015

  • Report

    Spotlight on 2014

    Spotlight 2014 is RAND Europe’s annual review. We present our research to support policymaking in four areas of transformation: harnessing the power of ICT, safeguarding society, building healthier communities and innovating for efficiency.

    Jan 27, 2015

  • Report

    Public Perception of Security and Privacy: Results of the comprehensive analysis of PACT's pan-European Survey

    This study reports public preferences for security, surveillance and privacy across 27 European Member States measured using a stated preference survey. It focuses on three real life contexts: metro travel, internet use and health records.

    Jan 27, 2015

  • Service members working in the Global Strategic Warning and Space Surveillance System Center

    Commentary

    Put a Cybercop on the Beat

    What remains vitally needed is legislation that would grant at least one capable government organization the authority to track cyber-intruders and -criminals with the same freedom and speed of maneuver that these adversaries enjoy, while protecting the civil liberties and freedoms that allowed the establishment of the Internet.

    Jan 22, 2015

  • Man with a laptop at beach resort

    Commentary

    The Great American Working Vacation

    For years, vacations were a time for Americans to reset and renew, a time away from work. But more and more, Americans check their email, take calls, and work while on vacation.

    Jan 19, 2015

  • Horizon over the water, sunrise or sunset

    Project

    Foresight and Optimisation in Horizon 2020

    As digital technology becomes more relevant in diverse aspects of our economy and society, it is important to anticipate changes in technology and how we use it. This understanding is particularly important for Horizon 2020, the EU’s 7-year research and innovation funding programme.

    Jan 12, 2015

  • Report

    RAND Review: January-February 2015

    This issue of RAND Review reports on technology literacy in kids, self-driving cars, marijuana legalization, hacking and cybersecurity, monetary compensation for mass tragedies, and recent philanthropic gifts to RAND.

    Jan 12, 2015

  • People pose in front of a display showing the word 'cyber' in binary code, Zenica, Bosnia and Herzegovina, December 27, 2014

    Commentary

    After a Year of Major Hacks, 2015 Resolutions to Bolster Cyber Security

    With numerous data breaches and emerging software vulnerabilities, 2014 was the year the hack went viral. But realizing a few New Year's resolutions in 2015 could help defenders make strides in protection, tools, and techniques to gain the edge over cyber attackers in years to come.

    Dec 31, 2014

  • Evan Spiegel at RAND's Politics Aside 2014

    Blog

    Snapchat CEO Discusses App's Appeal, Future of Digital Communication

    With technology a persistent theme throughout RAND's biennial Politics Aside event, it was only fitting that the proceedings closed with a conversation on social media between Michael Lynton, CEO of Sony Pictures, and Evan Spiegel, the 24-year-old co-founder and CEO of Snapchat.

    Nov 20, 2014

  • The flags of China and Hong Kong are seen above tents outside Legislative Council Complex at an occupied area in Hong Kong November 11,2014

    Commentary

    The Mountains Are High and the Emperor Is Far Away

    Since September 22, tens of thousands of protesters have flooded the streets of Hong Kong, calling for universal suffrage in the 2017 chief executive election and the resignation of current Chief Executive Chun-ying Leung. When they took to Twitter to share their ideas and mobilize support, they revealed the profound disconnect that separates elements of Hong Kong society from their mainland counterparts.

    Nov 11, 2014

  • t-events-rand-podcast-hr

    Multimedia

    Self-Driving Vehicles

    At this October 2014 event at RAND, information scientist Nidhi Kalra discusses the social, environmental, and policy implications of driverless cars.

    Oct 28, 2014

  • Server room in data center

    Commentary

    Putting the Brussels House in Order: Why Data Protection Frameworks in EU Institutions and Agencies Are Not Fit for Purpose

    EU institutions and agencies urgently need to revisit the frameworks that govern data privacy in their own houses if they want to keep pace with some of the latest trends in corporate information and communication technology (ICT) delivery and use, such as cloud computing or the consumerisation of ICT ('bring your own device').

    Oct 23, 2014

  • Tinker Air Force Base Computing Center

    Report

    Cost Considerations in Cloud Computing

    Until the Department of Defense develops official guidance for cost analysis of cloud and data centers, examining cost drivers for several data management approaches can help guide DoD analysts.

    Oct 2, 2014

  • Report

    Designing Unmanned Systems with Greater Autonomy: Using a Federated, Partially Open Systems Architecture Approach

    Many current unmanned systems (UxSs) employ different communication systems and have limited autonomy, which limit information sharing with warfighters and other UxSs. This report identifies ways to address these limitations.

    Sep 17, 2014

  • Oscar-winning actress Jennifer Lawrence has contacted authorities to investigate who stole and posted nude images of her online, part of a reported mass hacking of celebrities' intimate photos

    Commentary

    Hackerazzi: How Naked Celebrities Might Make the Cloud Safer

    Despite data breach after data breach that lays bare the personal information of millions of people, leading to only incremental changes by the hacked company, it seems it only takes a handful of celebrity nude selfies to bring issues like cloud security and multi-factor authentication to the fore causing immediate changes.

    Sep 8, 2014

  • Report

    Portfolio Assessment of the Department of State Internet Freedom Program

    Employing portfolio analysis techniques, the authors assessed the Bureau of Democracy, Human Rights, and Labor (DRL)'s Internet freedom program for FY 2012-2013 to determine its project portfolio's effectiveness in performance, balance, and synergy.

    Sep 4, 2014

  • Man in living room with smart television

    Commentary

    Are You Sitting Comfortably? Understanding the Security and Privacy Implications of the Internet-Connected Living Room

    The modern living room contains a range of Internet-connected devices. This increased connectivity comes with privacy and security concerns, threats to consumers, and challenges for industry.

    Sep 3, 2014

  • Family of mother and daughters playing video games together

    Project

    Are You Sitting Comfortably?

    A range of emerging, but important, risks to our Internet-connected living room have implications for security and privacy. Addressing these might require more action from government, industry and consumers alike.

    Sep 2, 2014

  • Two boys sitting on a couch playing video games, photo by Sean Davis/Fotolia

    Report

    Living Room Connected Devices: Opportunities, Security Challenges, and Privacy Implications

    The "Internet-connected living room" poses security and privacy implications for industry and consumers, offering potential benefits as well as threats associated with the technical capabilities of living room connected devices.

    Sep 2, 2014